{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,13]],"date-time":"2026-03-13T22:56:38Z","timestamp":1773442598013,"version":"3.50.1"},"reference-count":49,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"3","license":[{"start":{"date-parts":[[2022,9,1]],"date-time":"2022-09-01T00:00:00Z","timestamp":1661990400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2022,9,1]],"date-time":"2022-09-01T00:00:00Z","timestamp":1661990400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,9,1]],"date-time":"2022-09-01T00:00:00Z","timestamp":1661990400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"name":"National Key Research and Development Program of China","award":["2018AAA0102304"],"award-info":[{"award-number":["2018AAA0102304"]}]},{"DOI":"10.13039\/501100012226","name":"Fundamental Research Funds for the Central Universities","doi-asserted-by":"publisher","award":["YWF-20-BJ-J-1018"],"award-info":[{"award-number":["YWF-20-BJ-J-1018"]}],"id":[{"id":"10.13039\/501100012226","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61732019"],"award-info":[{"award-number":["61732019"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100011347","name":"State Key Laboratory of Software Development Environment","doi-asserted-by":"publisher","award":["SKLSDE-2019ZX-05"],"award-info":[{"award-number":["SKLSDE-2019ZX-05"]}],"id":[{"id":"10.13039\/501100011347","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Rel."],"published-print":{"date-parts":[[2022,9]]},"DOI":"10.1109\/tr.2021.3093159","type":"journal-article","created":{"date-parts":[[2021,8,4]],"date-time":"2021-08-04T20:10:41Z","timestamp":1628107841000},"page":"1325-1339","source":"Crossref","is-referenced-by-count":7,"title":["How Developers Modify Pull Requests in Code Review"],"prefix":"10.1109","volume":"71","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-6582-0654","authenticated-orcid":false,"given":"Jing","family":"Jiang","sequence":"first","affiliation":[{"name":"State Key Laboratory of Software Development Environment, Beihang University, Beijing, China"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0842-2211","authenticated-orcid":false,"given":"Jiangfeng","family":"Lv","sequence":"additional","affiliation":[{"name":"State Key Laboratory of Software Development Environment, Beihang University, Beijing, China"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Jiateng","family":"Zheng","sequence":"additional","affiliation":[{"name":"State Key Laboratory of Software Development Environment, Beihang University, Beijing, China"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2258-5893","authenticated-orcid":false,"given":"Li","family":"Zhang","sequence":"additional","affiliation":[{"name":"State Key Laboratory of Software Development Environment, Beihang University, Beijing, China"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/APSEC48747.2019.00072"},{"key":"ref2","doi-asserted-by":"crossref","first-page":"46","DOI":"10.1145\/3196398.3196466","article-title":"Crop: Linking code reviews to source code changes","volume-title":"Proc. 15th Working Conf. Mining Softw. Repositories","author":"Paixao","year":"2018"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.2004.1357817"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/ASEW.2008.4686322"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/2491411.2491444"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/1370750.1370767"},{"key":"ref7","first-page":"141","volume-title":"Proc. IEEE 22nd Int. Conf. Softw. Anal., Evol., Reeng.","author":"Thongtanunam","year":"2015"},{"key":"ref8","first-page":"99","article-title":"Automatically recommending code reviewers based on their expertise: An empirical comparison","volume-title":"Proc. 31st IEEE\/ACM Int. Conf. Autom. Softw. Eng.","author":"Hannebauer","year":"2016"},{"key":"ref9","first-page":"261","volume-title":"Proc. IEEE Int. Conf. Softw. Maintenance Evol.","author":"Xia","year":"2015"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/s11390-015-1577-3"},{"key":"ref11","first-page":"141","volume-title":"Proc. IEEE 22nd Int. Conf. Softw. Anal., Evol., Reeng.","author":"Thongtanunam","year":"2015"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ICPC.2017.30"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2015.55"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/2145204.2145396"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/1368088.1368162"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/2786805.2786850"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/2568225.2568260"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/2635868.2635882"},{"key":"ref19","first-page":"1","article-title":"On the effect of discussions on pull request decisions","volume-title":"Proc. 19th Belgium-Netherlands Softw. Evol. Workshop","author":"Decan","year":"2019"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/32.799955"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/1414004.1414030"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1023\/A:I0I0933404324"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-01899-2"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1002\/047172842x"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2018.05.065"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/2884781.2884826"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-018-9602-0"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2019.00026"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/SANER48275.2020.9054794"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.4304\/jsw.8.11.2815-2829"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/ESEM.2019.8870173"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2013.6606642"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/ICSME.2016.65"},{"key":"ref34","first-page":"222","article-title":"Correct: Code reviewer recommendation in GitHub based on cross-project and technology experience","volume-title":"Proc. 38th Int. Conf. Softw. Eng. Companion","author":"Rahman","year":"2016"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2925560"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2018.01.015"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.3390\/sym10040114"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1145\/3345629.3345637"},{"key":"ref39","doi-asserted-by":"crossref","first-page":"196","DOI":"10.1016\/j.jss.2019.04.055","volume":"154","author":"Jiang","year":"2019","journal-title":"J. Syst. Softw."},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1145\/3338906.3340449"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1145\/3377811.3380335"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2015.2500238"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2016.01.004"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2016.10.006"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/ICSME.2014.107"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1007\/s11390-017-1783-2"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/MSR.2017.17"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1145\/2786805.2786850"},{"key":"ref49","doi-asserted-by":"crossref","first-page":"496","DOI":"10.1145\/2901739.2903496","article-title":"The relationship between commit message detail and defect proneness in Java projects on GitHub","volume-title":"Proc. IEEE\/ACM 13th Working Conf. Mining Softw. Repositories","author":"Barnett","year":"2016"}],"container-title":["IEEE Transactions on Reliability"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/24\/9872066\/09507319.pdf?arnumber=9507319","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,1,11]],"date-time":"2024-01-11T23:36:17Z","timestamp":1705016177000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9507319\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,9]]},"references-count":49,"journal-issue":{"issue":"3"},"URL":"https:\/\/doi.org\/10.1109\/tr.2021.3093159","relation":{},"ISSN":["0018-9529","1558-1721"],"issn-type":[{"value":"0018-9529","type":"print"},{"value":"1558-1721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,9]]}}}